Penetration Testing Locked KeyboardPENETRATION TESTING

READ: The Beginner’s Guide to External Penetration Testing Reconnaissance. External penetration testing reconnaissance is a critical first step in a professional security assessment. By using the same methods and resources that attackers use to get into networks, along with open source intelligence, pen testers can get a much richer profile of an organization’s security strengths and weaknesses and conduct more successful and accurate assessments. Read more
[SECURITYBOULEVARD.COM]

WHY, WHEN & HOW: Often Should You Pen Test? Read this executive summary where the pen testers explain the process and findings in a high-level manner. You will also find a technical summary with more in-depth details. Read more
[SECURITYINTELLIGENCE.COM]

OPEN SOURCE TOOL: New Pen Test Tool Tricks Targets with Microsoft WCX Files. A new open-source penetration testing tool, dubbed Firework, will let pen testers collect sensitive data by tricking their targets into opening Microsoft WCX files. Read more
[DARKREADING.COM]

PERSPECTIVES: Cybersecurity the Right Way. Read how IT security leaders from across government bring organization and prioritization to their many cybersecurity efforts. Read more
[FCW.COM]

==========

NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems September 2018 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-september-2018.

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.

==========

Penetration Testing – Daily Tech Update – October 15, 2018